Tools

"... Many security properties of cryptographic protocols can be all seen as specific instances of a general property, we called Non Deducibility on Composition (NDC), that we proposed a few years ago for studying information flow properties in computer systems. The advantage of our unifying theory is tha ..."

Many security properties of cryptographic protocols can be all seen as specific instances of a general property, we called Non Deducibility on Composition (NDC), that we proposed a few years ago for studying information flow properties in computer systems. The advantage of our unifying theory is that formal comparison among these properties is now easier and that the full generality of NDC has helped us in finding a few new attacks on cryptographic protocols.

by
Martín Abadi
- In Foundations of Software Science and Computation Structures: Second International Conference, FOSSACS &apos;99, 1999

"... Specifications for security protocols range from informal narrations of message flows to formal assertions of protocol properties. This paper (intended to accompany a lecture at ETAPS '99) discusses those specifications and suggests some gaps and some opportunities for further work. Some of the ..."

Specifications for security protocols range from informal narrations of message flows to formal assertions of protocol properties. This paper (intended to accompany a lecture at ETAPS &apos;99) discusses those specifications and suggests some gaps and some opportunities for further work. Some of them pertain to the traditional core of the field; others appear when we examine the context in which protocols operate.

"... . Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that public key based protocols will be employed. There are a number of important design decisions to be made in choosing an appropria ..."

. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that public key based protocols will be employed. There are a number of important design decisions to be made in choosing an appropriate protocol. In this paper the design requirements are reviewed and some recently proposed public key protocols for wireless communications are examined. A new public key protocol is also proposed. 1 Introduction Security requirements in the emerging third generation of wireless communications will be considerably more comprehensive than those in the current second generation digital systems. Cryptographic protocols and algorithms need to be used in order to satisfy these requirements. Probably the most critical security interface is that between the user and network, characterised by the radio connection. The security of this interface is paramount in preventing fraudulent access to ne...

by
Colin Boyd
- In Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997

"... The importance of clarifying the goals of a cryptographic protocol is widely recognised. The majority of authors have addressed intensional goals which are concerned with correct operation within the protocol itself. Extensional goals are properties independent of the protocol and define what the pr ..."

The importance of clarifying the goals of a cryptographic protocol is widely recognised. The majority of authors have addressed intensional goals which are concerned with correct operation within the protocol itself. Extensional goals are properties independent of the protocol and define what the protocol is designed to achieve. This paper reviews the previous literature on goals in protocols and classifies them as intensional or extensional goals. A hierarchy of extensional protocol goals is proposed which includes the major proposed goals for key establishment. It is shown how these extensional goals can be exploited to motivate design of entity authentication protocols.

Abstract. Traditional authentication is two valued. Unfortunately, authentication mechanisms cannot perfectly establish electronic participant’s identity. Despite years of research and its manifestations such as digital signatures, zero knowledge proofs, public key infrastructures, certificates, biometric tools, etc. the best authentication evidence is a combination of multiple factors. All authentication systems are imprecise, but there are no existing systems that capture or that facilitate reasoning about this property. This paper introduces many fundamental issues in multi-tiered authentication systems. 1

"... Authentication can serve both for assigning responsibility and for giving credit. Some authentication protocols are adequate for one purpose but not the other. This paper explains the distinction between responsibility and credit, through several examples, and discusses the role of this distinct ..."